Homepage ›› Companies ›› Ddg Bilişim Tekn.Yaz.Ve Don.San.Ve Tic. LLC. ›› Corporate Trainings

Ddg Bilişim Tekn.Yaz.Ve Don.San.Ve Tic. LLC.

Adres: ALINTERİ BULVARI 27 26

Tel 1: 0 (312) 385 45-48

Faks:

Email 1: deneme@ostim.com.tr

Web: https://www.ddg.com.tr/default.aspx

Corporate Trainings

OBJECTIVE OF EDUCATION

The leading risk that threatens information security is the lack of awareness of employees about security. When the information security breach incidents experienced by world-famous IT companies in recent years are examined in detail, it is revealed that the main source of the problem is the lack of information security awareness of the employees. One of the most important items in increasing the awareness level of the employees is to provide regular training and to carry out attack simulations including awareness scenarios after the trainings.

Information Security Awareness Training has a content and process that will allow participants to spend a day without getting bored by bringing together theory and practice. The awareness level measurement/evaluation to be carried out after the training, in which current attack methods and the measures that can be taken against them are explained with scenarios, will also concretely show the increase in the awareness level of the participants.


BASIC INFORMATION SECURITY CONCEPTS

* Basic Information Security Concepts
* Security
* Accuracy and Integrity
* Information classification
* Building blocks of information security
* Information security, cyber security differences
* The importance of user awareness in terms of cyber security

SOURCE OF ATTACKS AND THREATS TO INFORMATION SECURITY

* DOS/DDOS (Denial of Service) attacks
* Commercial information and technology theft
* Web page content modification attacks (defacement)
* Virus, worm, trojan concepts
* Unauthorized access attempts
* Technological Espionage
* Cyber Blackmail
* Fraud and imitation (Application)

GENERAL SAFETY PRECAUTIONS

* Damages caused by misuse of information technologies
* Uncontrolled Information sharing
* The dignity of the institution, its image in the society may be damaged
* Hardware, software, data and corporate employees may be damaged
* Not being able to access important data on time
* Monetary losses
* Loss of time
* Studies to determine the value of information
* Information classification study
* Information leakage and ways to protect

SOCIAL ENGINEERING, PHARMING ATTACKS AND THE IMPORTANCE OF USER AWARENESS

* The most important part of information security: user security awareness
* Human weaknesses in Social Engineering
* Types of attacks in Social Engineering
* Social Engineering Measures to be Taken

MOBILE SYSTEMS AND SECURITY

* Operating systems that record GPS information
* Applications using GPS information
* Apps that manage your phone remotely
* Mobile operating systems vulnerabilities
* Credit card usage in application markets
* Viruses coming via Bluetooth and
* Viruses via SMS and MMS
* Apps that turn your phone into a voice recorder
* Harms of IOS JB and Android root access
* MDM(Mobile Device Management) solutions

SOCIAL MEDIA RISKS AND SAFE USE OF SOCIAL MEDIA

* Social Media security and corporate privacy
* Risks and Safety in Social Networks
* Privacy and copyrights
* Fake news
* Phishing attacks
* Sharing on Social Networks and monitoring these shares
* Applications (applications) and their permissions on Social Networks
* Social engineering and gathering information about people
* Fake brand and fake celebrity accounts
* Photos you upload on social networks
* Openings on social networks
* Hacking and account security of social network administrators
* Security awareness of social media agencies and managers

SAFE SHARING ON SOCIAL NETWORKS

* Photos and metadata information
* Photos and GPS information
* Sharing information with photos and shorthand
* Your IP address and location detection
* Personality analysis from your posts
* Insults in your posts
* Fake news and fake news sharing


AWARENESS OF LEGAL COMPLIANCE 5651

The law imposes different obligations on those who offer content, access and collective use.
Legal sanctions may apply for failure to comply with these obligations. 5651 An important milestone for the IT world.
is the law. The law has made it mandatory to take some measures. Covering the use and benefits of the law
It is an issue that everyone should know in order to raise awareness.

In-house Application and Usage Awareness Training

How the above-mentioned awareness trainings should be used in your business or company "what? when? where? how? why? who?" It is a training that aims to prevent the loss of time, effort and money by providing answers to the questions.

* System Security
* Risks of Operating Systems
* Safe Operating system usage
* Risks Involved in Using Mail
* Safe Internet and Mail Usage
* Protection of Commercial Correspondence
* Web Content Management and Risks
* Internal Network Usage, Risks and Precautions to be Taken
* Cloud Usage Advantages and Risks
* File Security, Sharing and Risks

Get Info
Yazılım-Bilişim ve Bilgisayar Programları